A System Framework for Player Selection
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2011, Vol 2, Issue 8
Abstract
The performance of Indian sport person has been pathetic at International level. The performance in any sport or game is a combine effect of various parameters like the Body Posture and Body Type, Diet, Exercise, Training, Psychology of the player, Socio-economic status, and the Fitness Parameters like Muscular Strength, Muscular Endurance, Cardiovascular Endurance, Flexibility and Aerobic and Anaerobic Power etc. The studies in the physical education proved that, to excel in specific sport and game it prominently requires specific physical fitness and skills and therefore selection of player having certain physical fitness and skill becomes an important issue. In the selection of players for specific sports and game form among the domain of large number of players effectively we can use the data mining methods. This paper proposed method using data mining for the selection of players suitable for specific sports and game.
Authors and Affiliations
S. P. Deshpande , Dr. V. M. Thakare
A Comparative Study on ATM Security with Multimodal Biometric System
Security is a major issue in Automated Teller Machine (ATM).with the wide spread utilization of electronic transactions it is necessary to increase customers recognition accuracy. Biometric systems can offer convenient a...
CHEQUE CLEARANCE SYSTEM USING VARIOUS VALIDATION TECHNIQUES
Processing cheques manually is been done for decades and more efficient systems are still under research. In this entire processing system, providing a secured transaction with efficient verification is what more importa...
Measure Performance of VRS Model using Simulation Approach by Comparing COCOMO Intermediate Model in Software Engineering
Estimation of a software project failure is based on project analogies in the area of software cost estimation. In all software cost estimation approaches important decisions must be made regarding certain approaches in...
Implementation of a new 32-bit Algorithm for Password Hashing
The importance of hash algorithms for protecting the authenticity of information is exhibited. Application includes probity protection, traditional message authentication and digital signatures. As it is evident from rec...
Using Queuing theory the performance measures of cloud with infinite servers
Cloud computing has got enormous popularity as it offers dynamic, low-cost computing solutions. To get the service of cloud the user has to be in queue until he is served. Each arriving Cloud computing User (CCU) request...